Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy:
This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
IBM Blueprint
2022
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738460857/?ar |
Zusammenfassung: | This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Spectrum® Copy Data Management as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward SQL database user activities to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. Finally, this document outlines the steps that are involved to create a Scheduled Job by using IBM Spectrum® Copy Data Management with various actions. |
Umfang: | 1 Online-Ressource (34 Seiten) illustrations |
ISBN: | 9780738460857 0738460850 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-082537895 | ||
003 | DE-627-1 | ||
005 | 20240228121826.0 | ||
007 | cr uuu---uuuuu | ||
008 | 221111s2022 xx |||||o 00| ||eng c | ||
020 | |a 9780738460857 |c electronic bk. |9 978-0-7384-6085-7 | ||
020 | |a 0738460850 |c electronic bk. |9 0-7384-6085-0 | ||
035 | |a (DE-627-1)082537895 | ||
035 | |a (DE-599)KEP082537895 | ||
035 | |a (ORHE)9780738460857 | ||
035 | |a (DE-627-1)082537895 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20221018 | |
100 | 1 | |a Sapkar, Tejas |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy |c Tejas Sapkar, Shashank Shingornikar |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b IBM Blueprint |c 2022 | |
300 | |a 1 Online-Ressource (34 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Spectrum® Copy Data Management as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward SQL database user activities to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. Finally, this document outlines the steps that are involved to create a Scheduled Job by using IBM Spectrum® Copy Data Management with various actions. | ||
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Internet |x Security measures | |
650 | 4 | |a Surveillance des menaces informatiques | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Internet ; Security measures | |
700 | 1 | |a Shingornikar, Shashank |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738460857/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-082537895 |
---|---|
_version_ | 1821494943046172672 |
adam_text | |
any_adam_object | |
author | Sapkar, Tejas Shingornikar, Shashank |
author_facet | Sapkar, Tejas Shingornikar, Shashank |
author_role | aut aut |
author_sort | Sapkar, Tejas |
author_variant | t s ts s s ss |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)082537895 (DE-599)KEP082537895 (ORHE)9780738460857 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02788cam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-082537895</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121826.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221111s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738460857</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6085-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738460850</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6085-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082537895</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP082537895</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738460857</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082537895</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20221018</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sapkar, Tejas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy</subfield><subfield code="c">Tejas Sapkar, Shashank Shingornikar</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">IBM Blueprint</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (34 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Spectrum® Copy Data Management as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward SQL database user activities to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. Finally, this document outlines the steps that are involved to create a Scheduled Job by using IBM Spectrum® Copy Data Management with various actions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Surveillance des menaces informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shingornikar, Shashank</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738460857/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-082537895 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:24Z |
institution | BVB |
isbn | 9780738460857 0738460850 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (34 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IBM Blueprint |
record_format | marc |
spelling | Sapkar, Tejas VerfasserIn aut Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy Tejas Sapkar, Shashank Shingornikar [First edition]. [Place of publication not identified] IBM Blueprint 2022 1 Online-Ressource (34 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Spectrum® Copy Data Management as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward SQL database user activities to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. Finally, this document outlines the steps that are involved to create a Scheduled Job by using IBM Spectrum® Copy Data Management with various actions. Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures Surveillance des menaces informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures Shingornikar, Shashank VerfasserIn aut |
spellingShingle | Sapkar, Tejas Shingornikar, Shashank Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures Surveillance des menaces informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures |
title | Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy |
title_auth | Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy |
title_exact_search | Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy |
title_full | Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy Tejas Sapkar, Shashank Shingornikar |
title_fullStr | Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy Tejas Sapkar, Shashank Shingornikar |
title_full_unstemmed | Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy Tejas Sapkar, Shashank Shingornikar |
title_short | Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy |
title_sort | proactive early threat detection and securing sql database with ibm qradar and ibm spectrum copy data management using ibm flashsystem safeguarded copy |
topic | Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures Surveillance des menaces informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures |
topic_facet | Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures Surveillance des menaces informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures |
work_keys_str_mv | AT sapkartejas proactiveearlythreatdetectionandsecuringsqldatabasewithibmqradarandibmspectrumcopydatamanagementusingibmflashsystemsafeguardedcopy AT shingornikarshashank proactiveearlythreatdetectionandsecuringsqldatabasewithibmqradarandibmspectrumcopydatamanagementusingibmflashsystemsafeguardedcopy |